First published: Tue Aug 27 2024(Updated: )
A vulnerability exists in FileCatalyst Workflow whereby a field accessible to the super admin can be used to perform an SQL injection attack which can lead to a loss of confidentiality, integrity, and availability.
Credit: df4dee71-de3a-4139-9588-11b62fe6c0ff
Affected Software | Affected Version | How to fix |
---|---|---|
Fortra FileCatalyst Workflow | >=5.0.4<5.1.7 |
Upgrade to FileCatalyst Workflow 5.1.7 or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6632 has a high severity rating due to the potential for SQL injection attacks.
To mitigate CVE-2024-6632, upgrade to a version of Fortra FileCatalyst Workflow that is above 5.1.7 or below 5.0.4.
CVE-2024-6632 can lead to a loss of confidentiality, integrity, and availability if exploited.
CVE-2024-6632 affects Fortra FileCatalyst Workflow versions between 5.0.4 and 5.1.7.
CVE-2024-6632 is classified as an SQL injection vulnerability.